Overview:

FireEye iSIGHT Threat Intelligence subscriptions deliver comprehensive, actionable intelligence to help you proactively defend against new and emerging cyber threats and align your security program with corporate risk management goals. We tailor intelligence to your security mission and staff, giving both mature and growing security teams critical context on attacker intent and activity.

FireEye iSIGHT Threat Intelligence is a proactive, forward-looking means of qualifying threats poised to disrupt your business based on the intents, tools and tactics of the attacker. Our high-fidelity, comprehensive intelligence delivers visibility beyond the typical attack lifecycle, adding context and priority to global threats before, during and after an attack.

It helps mitigate risk, bolster incident response, and enhance your overall security ecosystem. Get the intel you need to predict attack and refocus your attention on what matters most to your business.

The FireEye iSIGHT Threat Intelligence Advantage

FireEye iSIGHT Threat Intelligence is unique in the industry. More than 150 FireEye security researchers and experts around the globe apply decades of experience to gathering forward-looking, high-fidelity, adversary-focused intelligence. With an unmatched view into adversaries, victims and networks worldwide, iSIGHT threat intelligence delivers visibility across the extended cyber attack lifecycle to all levels of your business.

Benefits

Get actionable threat intelligence tailored to your security mission

Protect your organization from all categories of threats, including cyber espionage, cyber crime and hacktivisim

Most Comprehensive

Fusion Intelligence
Fusion Intelligence delivers comprehensive, situational awareness of the global threat landscape with insights into ongoing, past and predictive threat activity. It empowers your team with a deep understanding of past, present and future adversary activities, including trends and typical tools, tactics and procedures (TTPs). The subscription equips organizations with processes, defense scenarios, deep dives and industry analysis to enable a proactive security posture. It includes Operational Intelligence. Fusion Intelligence is used by advanced security operations center (SOC) or incident response (IR) team members who proactively hunt for adversaries and want details about threat actors, their motives and TTPs.

Motivation Based

Cyber Espionage Intelligence
Cyber Espionage Intelligence delivers deep intelligence analysis and insights into adversaries who target corporate and government entities for strategic advantage. This subscription provides profiles of emerging adversaries’ policies, strategies, doctrines and operational arts. Cyber Espionage Intelligence is used by advanced SOC or IR team members who proactively hunt for adversaries and want details and TTPs of threat actors with an espionage motivation.

Cyber Crime Intelligence
Cyber Crime Intelligence delivers deep intelligence and technical analysis that enable improved responses to abuses of computer systems, cyber crime operations and the targeting of victims’ money, goods or services. With this subscription, you’ll gain a better understanding of credential theft operations, ransomware, distributed denial-of-service (DDoS) attacks, network compromises and malware, including point-of-sale (POS) and mobile malware. Cyber Crime Intelligence is used by advanced SOC or IR team members who proactively hunt for adversaries and want details and TTPs of threat actors with a cyber crime motivation.

Function Based

Operational Intelligence
Operational Intelligence gives security analysts actionable context for alerts that enable them to prioritize and inform their responses. It provides access to the full FireEye library of malware intelligence reporting, as well as actor overviews and indicator reports. Operational Intelligence is used by SOC or IR teams who want to understand which threats to focus on and when.

Executive Intelligence
Executive Intelligence conveys organizational risks to decision makers who direct security investment and strategy. It includes intelligence analyses of industries, regions and threats to enterprise networks. It improves executive-level communication on security topics relevant to your enterprise. Executive Intelligence is used by C-level executives, such as chief information security officers (CISOs), who want to understand the business risks associated with cyber threats.

Vulnerability Intelligence
Vulnerability Intelligence prioritizes patch management workflows based on active and evolving exploits of vulnerabilities in your critical business systems. This subscription helps you identify unaddressed vulnerabilities, prioritize patch cycles and increase patch effectiveness and more. Reports include all threat intelligence and vulnerabilities related to critical infrastructure. Vulnerability Intelligence is used by IT professionals and vulnerability analysts who want to improve efficiency and focus their time on top priorities.

iSIGHT Threat Intelligence Delivery Mechanisms:

Intelligence and reports from iSIGHT Threat Intelligence subscriptions can be accessed in many ways.

Onboarding and Provisioning provisions users and API/browser plugin keys, as well as a formal annual business review.

Threat Media Highlights delivers a daily email that tracks current security stories, answers inbound questions from business executives and includes proactive analyses of important events to your executives and board members. This email correlates highlights with iSIGHT Intelligence reports to give you a detailed understanding of the security landscape.

iSIGHT API and SDK enables you to use our intelligence with your security infrastructure and risk and compliance management technologies.

Compare:

iSIGHT Threat Intelligence Enablement and Integration

Your analysts can tap into iSIGHT Intelligence to make inquiries, conduct extended research and perform detailed analyses. There are three levels of enablement:

Level 1: Onboarding and Provisioning equips you with the materials and engagement you need to use our intelligence solutions, including a selfservice portal, customer support desk and API provisioning. It is included in the purchase price of all subscriptions.

Level 2: Intelligence Coordination provides you with a designated FireEye Intelligence Account Manager who serves as a concierge, guide and facilitator for your FireEye investment.

Level 3: Intelligence Optimization provides you with a designated Intelligence Account Manager and a Threat Analyst who help you integrate FireEye iSIGHT Threat Intelligence with you security operations. It includes three intelligence workshops per year